Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 17:44
Behavioral task
behavioral1
Sample
09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe
-
Size
273KB
-
MD5
09f6b6752900a59b23c0298dccd62d40
-
SHA1
c9d9a143b774430f473e4cf275229d3fd1c2b758
-
SHA256
6e33a33b40e55c47d8aee39ebd354845ba97d966e11b60048be0a31b00e3d94a
-
SHA512
35bba98dd9cef02321968e594eb79fac22d23b539f72c1896ca0c6a5fdc72a06ee320f76733a8966c76a76149837e45a8cd73dcff2aa7e6dde5ff6ee8688771b
-
SSDEEP
6144:Ycm4FmowdHoSgWrXF5lpKGYV0aTk/BO0XJm4UEPOshN/xdKnvP48bm1W:e4wFHoSgWjdpKGATTk/jYIOWN/KnnP/
Malware Config
Signatures
-
Detect Blackmoon payload 43 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2456-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1804-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2400-120-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/844-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/988-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2320-347-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1704-353-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1776-462-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1028-1133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1404-918-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/812-897-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2168-750-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1640-621-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1640-615-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2560-553-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1592-516-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/848-425-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2024-414-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2072-299-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/704-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/304-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/912-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2104-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3048-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2760-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/896-144-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1816-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1640-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2840-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2816-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2528-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2704-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2636-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2560-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2800-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2116-8686-0x0000000077250000-0x000000007736F000-memory.dmp family_blackmoon behavioral1/memory/2116-16798-0x0000000077250000-0x000000007736F000-memory.dmp family_blackmoon behavioral1/memory/2116-17943-0x0000000077370000-0x000000007746A000-memory.dmp family_blackmoon behavioral1/memory/2116-23941-0x0000000077250000-0x000000007736F000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tbhbnb.exennhtnt.exejvjdv.exe3xrxffl.exerxlxfxx.exentbbnt.exe9pddj.exelfxlxfx.exenhthnn.exe7jppv.exe3vjpv.exexxrffrf.exe7thntt.exe9bnntb.exedvpdp.exepppvv.exelfrrxfl.exe1hnbtb.exedvjjp.exerlflrrx.exe3lfllrf.exetbhhtt.exebthbbb.exe1pdvd.exexxrfxlx.exenhhnbh.exepjpdp.exelfflrrf.exethnttt.exetbhhnh.exe1jjvd.exe1jvvp.exefffrlxl.exetthntb.exethnntn.exevdjdj.exexrfxrlf.exexfrlrll.exenthbhb.exe7tnttn.exeppjvv.exe7xlflxl.exeffrllxx.exetnhhnt.exetnbbnt.exejjdpj.exejdjjd.exelfxflrx.exettntht.exenttnbh.exelxfxxlr.exedvjvp.exe9rflxrf.exe5ttttt.exehhhnbb.exe9ntbnb.exe9jddd.exe5ppjp.exefrlrflr.exenhnnht.exennnbbt.exe3jdpd.exerffflxl.exexfflfxr.exepid process 2860 tbhbnb.exe 3060 nnhtnt.exe 2560 jvjdv.exe 2636 3xrxffl.exe 2736 rxlxfxx.exe 2704 ntbbnt.exe 2528 9pddj.exe 2456 lfxlxfx.exe 2816 nhthnn.exe 2840 7jppv.exe 1804 3vjpv.exe 1640 xxrffrf.exe 2400 7thntt.exe 2696 9bnntb.exe 1816 dvpdp.exe 896 pppvv.exe 1948 lfrrxfl.exe 2196 1hnbtb.exe 844 dvjjp.exe 848 rlflrrx.exe 2928 3lfllrf.exe 2760 tbhhtt.exe 3048 bthbbb.exe 2104 1pdvd.exe 988 xxrfxlx.exe 1348 nhhnbh.exe 912 pjpdp.exe 2744 lfflrrf.exe 304 thnttt.exe 704 tbhhnh.exe 2228 1jjvd.exe 2124 1jvvp.exe 1384 fffrlxl.exe 1720 tthntb.exe 2236 thnntn.exe 1884 vdjdj.exe 2948 xrfxrlf.exe 1616 xfrlrll.exe 2072 nthbhb.exe 2640 7tnttn.exe 2916 ppjvv.exe 2440 7xlflxl.exe 2524 ffrllxx.exe 2596 tnhhnt.exe 2492 tnbbnt.exe 2472 jjdpj.exe 2320 jdjjd.exe 1704 lfxflrx.exe 2740 ttntht.exe 1556 nttnbh.exe 2584 lxfxxlr.exe 2484 dvjvp.exe 2324 9rflxrf.exe 2128 5ttttt.exe 812 hhhnbb.exe 1928 9ntbnb.exe 2408 9jddd.exe 1948 5ppjp.exe 2196 frlrflr.exe 2024 nhnnht.exe 848 nnnbbt.exe 2396 3jdpd.exe 1588 rffflxl.exe 1824 xfflfxr.exe -
Processes:
resource yara_rule behavioral1/memory/2800-0-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jvjdv.exe upx behavioral1/memory/3060-26-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2736-54-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\9pddj.exe upx \??\c:\lfxlxfx.exe upx behavioral1/memory/2456-80-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhthnn.exe upx \??\c:\7jppv.exe upx behavioral1/memory/1804-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2400-120-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pppvv.exe upx C:\lfrrxfl.exe upx \??\c:\1hnbtb.exe upx behavioral1/memory/844-162-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\3lfllrf.exe upx \??\c:\1pdvd.exe upx behavioral1/memory/988-209-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nhhnbh.exe upx \??\c:\pjpdp.exe upx C:\thnttt.exe upx \??\c:\tbhhnh.exe upx behavioral1/memory/2320-347-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1704-353-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1776-462-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2216-574-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1932-647-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2908-689-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3048-700-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2852-777-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2428-850-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2244-1023-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1032-1222-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1404-1176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1208-1170-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1340-1139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1028-1133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1800-1062-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1092-1046-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2888-1029-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2388-975-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2868-934-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1404-918-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/812-897-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2300-861-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2344-839-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2236-788-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1516-766-0x0000000000230000-0x0000000000257000-memory.dmp upx behavioral1/memory/2168-750-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2744-726-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/380-668-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1640-615-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2560-553-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2060-522-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1592-516-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1592-510-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1924-484-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3048-441-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/848-425-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/848-419-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2024-414-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1928-391-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2472-336-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2596-325-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exetbhbnb.exennhtnt.exejvjdv.exe3xrxffl.exerxlxfxx.exentbbnt.exe9pddj.exelfxlxfx.exenhthnn.exe7jppv.exe3vjpv.exexxrffrf.exe7thntt.exe9bnntb.exedvpdp.exedescription pid process target process PID 2800 wrote to memory of 2860 2800 09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe tbhbnb.exe PID 2800 wrote to memory of 2860 2800 09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe tbhbnb.exe PID 2800 wrote to memory of 2860 2800 09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe tbhbnb.exe PID 2800 wrote to memory of 2860 2800 09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe tbhbnb.exe PID 2860 wrote to memory of 3060 2860 tbhbnb.exe nnhtnt.exe PID 2860 wrote to memory of 3060 2860 tbhbnb.exe nnhtnt.exe PID 2860 wrote to memory of 3060 2860 tbhbnb.exe nnhtnt.exe PID 2860 wrote to memory of 3060 2860 tbhbnb.exe nnhtnt.exe PID 3060 wrote to memory of 2560 3060 nnhtnt.exe jvjdv.exe PID 3060 wrote to memory of 2560 3060 nnhtnt.exe jvjdv.exe PID 3060 wrote to memory of 2560 3060 nnhtnt.exe jvjdv.exe PID 3060 wrote to memory of 2560 3060 nnhtnt.exe jvjdv.exe PID 2560 wrote to memory of 2636 2560 jvjdv.exe 3xrxffl.exe PID 2560 wrote to memory of 2636 2560 jvjdv.exe 3xrxffl.exe PID 2560 wrote to memory of 2636 2560 jvjdv.exe 3xrxffl.exe PID 2560 wrote to memory of 2636 2560 jvjdv.exe 3xrxffl.exe PID 2636 wrote to memory of 2736 2636 3xrxffl.exe rxlxfxx.exe PID 2636 wrote to memory of 2736 2636 3xrxffl.exe rxlxfxx.exe PID 2636 wrote to memory of 2736 2636 3xrxffl.exe rxlxfxx.exe PID 2636 wrote to memory of 2736 2636 3xrxffl.exe rxlxfxx.exe PID 2736 wrote to memory of 2704 2736 rxlxfxx.exe ntbbnt.exe PID 2736 wrote to memory of 2704 2736 rxlxfxx.exe ntbbnt.exe PID 2736 wrote to memory of 2704 2736 rxlxfxx.exe ntbbnt.exe PID 2736 wrote to memory of 2704 2736 rxlxfxx.exe ntbbnt.exe PID 2704 wrote to memory of 2528 2704 ntbbnt.exe 9pddj.exe PID 2704 wrote to memory of 2528 2704 ntbbnt.exe 9pddj.exe PID 2704 wrote to memory of 2528 2704 ntbbnt.exe 9pddj.exe PID 2704 wrote to memory of 2528 2704 ntbbnt.exe 9pddj.exe PID 2528 wrote to memory of 2456 2528 9pddj.exe lfxlxfx.exe PID 2528 wrote to memory of 2456 2528 9pddj.exe lfxlxfx.exe PID 2528 wrote to memory of 2456 2528 9pddj.exe lfxlxfx.exe PID 2528 wrote to memory of 2456 2528 9pddj.exe lfxlxfx.exe PID 2456 wrote to memory of 2816 2456 lfxlxfx.exe nhthnn.exe PID 2456 wrote to memory of 2816 2456 lfxlxfx.exe nhthnn.exe PID 2456 wrote to memory of 2816 2456 lfxlxfx.exe nhthnn.exe PID 2456 wrote to memory of 2816 2456 lfxlxfx.exe nhthnn.exe PID 2816 wrote to memory of 2840 2816 nhthnn.exe 7jppv.exe PID 2816 wrote to memory of 2840 2816 nhthnn.exe 7jppv.exe PID 2816 wrote to memory of 2840 2816 nhthnn.exe 7jppv.exe PID 2816 wrote to memory of 2840 2816 nhthnn.exe 7jppv.exe PID 2840 wrote to memory of 1804 2840 7jppv.exe 3vjpv.exe PID 2840 wrote to memory of 1804 2840 7jppv.exe 3vjpv.exe PID 2840 wrote to memory of 1804 2840 7jppv.exe 3vjpv.exe PID 2840 wrote to memory of 1804 2840 7jppv.exe 3vjpv.exe PID 1804 wrote to memory of 1640 1804 3vjpv.exe xxrffrf.exe PID 1804 wrote to memory of 1640 1804 3vjpv.exe xxrffrf.exe PID 1804 wrote to memory of 1640 1804 3vjpv.exe xxrffrf.exe PID 1804 wrote to memory of 1640 1804 3vjpv.exe xxrffrf.exe PID 1640 wrote to memory of 2400 1640 xxrffrf.exe 7thntt.exe PID 1640 wrote to memory of 2400 1640 xxrffrf.exe 7thntt.exe PID 1640 wrote to memory of 2400 1640 xxrffrf.exe 7thntt.exe PID 1640 wrote to memory of 2400 1640 xxrffrf.exe 7thntt.exe PID 2400 wrote to memory of 2696 2400 7thntt.exe 9bnntb.exe PID 2400 wrote to memory of 2696 2400 7thntt.exe 9bnntb.exe PID 2400 wrote to memory of 2696 2400 7thntt.exe 9bnntb.exe PID 2400 wrote to memory of 2696 2400 7thntt.exe 9bnntb.exe PID 2696 wrote to memory of 1816 2696 9bnntb.exe dvpdp.exe PID 2696 wrote to memory of 1816 2696 9bnntb.exe dvpdp.exe PID 2696 wrote to memory of 1816 2696 9bnntb.exe dvpdp.exe PID 2696 wrote to memory of 1816 2696 9bnntb.exe dvpdp.exe PID 1816 wrote to memory of 896 1816 dvpdp.exe pppvv.exe PID 1816 wrote to memory of 896 1816 dvpdp.exe pppvv.exe PID 1816 wrote to memory of 896 1816 dvpdp.exe pppvv.exe PID 1816 wrote to memory of 896 1816 dvpdp.exe pppvv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09f6b6752900a59b23c0298dccd62d40_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\tbhbnb.exec:\tbhbnb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\nnhtnt.exec:\nnhtnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\jvjdv.exec:\jvjdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\3xrxffl.exec:\3xrxffl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\rxlxfxx.exec:\rxlxfxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\ntbbnt.exec:\ntbbnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\9pddj.exec:\9pddj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\lfxlxfx.exec:\lfxlxfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\nhthnn.exec:\nhthnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\7jppv.exec:\7jppv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\3vjpv.exec:\3vjpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\xxrffrf.exec:\xxrffrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\7thntt.exec:\7thntt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\9bnntb.exec:\9bnntb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\dvpdp.exec:\dvpdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\pppvv.exec:\pppvv.exe17⤵
- Executes dropped EXE
PID:896 -
\??\c:\lfrrxfl.exec:\lfrrxfl.exe18⤵
- Executes dropped EXE
PID:1948 -
\??\c:\1hnbtb.exec:\1hnbtb.exe19⤵
- Executes dropped EXE
PID:2196 -
\??\c:\dvjjp.exec:\dvjjp.exe20⤵
- Executes dropped EXE
PID:844 -
\??\c:\rlflrrx.exec:\rlflrrx.exe21⤵
- Executes dropped EXE
PID:848 -
\??\c:\3lfllrf.exec:\3lfllrf.exe22⤵
- Executes dropped EXE
PID:2928 -
\??\c:\tbhhtt.exec:\tbhhtt.exe23⤵
- Executes dropped EXE
PID:2760 -
\??\c:\bthbbb.exec:\bthbbb.exe24⤵
- Executes dropped EXE
PID:3048 -
\??\c:\1pdvd.exec:\1pdvd.exe25⤵
- Executes dropped EXE
PID:2104 -
\??\c:\xxrfxlx.exec:\xxrfxlx.exe26⤵
- Executes dropped EXE
PID:988 -
\??\c:\nhhnbh.exec:\nhhnbh.exe27⤵
- Executes dropped EXE
PID:1348 -
\??\c:\pjpdp.exec:\pjpdp.exe28⤵
- Executes dropped EXE
PID:912 -
\??\c:\lfflrrf.exec:\lfflrrf.exe29⤵
- Executes dropped EXE
PID:2744 -
\??\c:\thnttt.exec:\thnttt.exe30⤵
- Executes dropped EXE
PID:304 -
\??\c:\tbhhnh.exec:\tbhhnh.exe31⤵
- Executes dropped EXE
PID:704 -
\??\c:\1jjvd.exec:\1jjvd.exe32⤵
- Executes dropped EXE
PID:2228 -
\??\c:\1jvvp.exec:\1jvvp.exe33⤵
- Executes dropped EXE
PID:2124 -
\??\c:\fffrlxl.exec:\fffrlxl.exe34⤵
- Executes dropped EXE
PID:1384 -
\??\c:\tthntb.exec:\tthntb.exe35⤵
- Executes dropped EXE
PID:1720 -
\??\c:\thnntn.exec:\thnntn.exe36⤵
- Executes dropped EXE
PID:2236 -
\??\c:\vdjdj.exec:\vdjdj.exe37⤵
- Executes dropped EXE
PID:1884 -
\??\c:\xrfxrlf.exec:\xrfxrlf.exe38⤵
- Executes dropped EXE
PID:2948 -
\??\c:\xfrlrll.exec:\xfrlrll.exe39⤵
- Executes dropped EXE
PID:1616 -
\??\c:\nthbhb.exec:\nthbhb.exe40⤵
- Executes dropped EXE
PID:2072 -
\??\c:\7tnttn.exec:\7tnttn.exe41⤵
- Executes dropped EXE
PID:2640 -
\??\c:\ppjvv.exec:\ppjvv.exe42⤵
- Executes dropped EXE
PID:2916 -
\??\c:\7xlflxl.exec:\7xlflxl.exe43⤵
- Executes dropped EXE
PID:2440 -
\??\c:\ffrllxx.exec:\ffrllxx.exe44⤵
- Executes dropped EXE
PID:2524 -
\??\c:\tnhhnt.exec:\tnhhnt.exe45⤵
- Executes dropped EXE
PID:2596 -
\??\c:\tnbbnt.exec:\tnbbnt.exe46⤵
- Executes dropped EXE
PID:2492 -
\??\c:\jjdpj.exec:\jjdpj.exe47⤵
- Executes dropped EXE
PID:2472 -
\??\c:\jdjjd.exec:\jdjjd.exe48⤵
- Executes dropped EXE
PID:2320 -
\??\c:\lfxflrx.exec:\lfxflrx.exe49⤵
- Executes dropped EXE
PID:1704 -
\??\c:\ttntht.exec:\ttntht.exe50⤵
- Executes dropped EXE
PID:2740 -
\??\c:\nttnbh.exec:\nttnbh.exe51⤵
- Executes dropped EXE
PID:1556 -
\??\c:\lxfxxlr.exec:\lxfxxlr.exe52⤵
- Executes dropped EXE
PID:2584 -
\??\c:\dvjvp.exec:\dvjvp.exe53⤵
- Executes dropped EXE
PID:2484 -
\??\c:\9rflxrf.exec:\9rflxrf.exe54⤵
- Executes dropped EXE
PID:2324 -
\??\c:\5ttttt.exec:\5ttttt.exe55⤵
- Executes dropped EXE
PID:2128 -
\??\c:\hhhnbb.exec:\hhhnbb.exe56⤵
- Executes dropped EXE
PID:812 -
\??\c:\9ntbnb.exec:\9ntbnb.exe57⤵
- Executes dropped EXE
PID:1928 -
\??\c:\9jddd.exec:\9jddd.exe58⤵
- Executes dropped EXE
PID:2408 -
\??\c:\5ppjp.exec:\5ppjp.exe59⤵
- Executes dropped EXE
PID:1948 -
\??\c:\frlrflr.exec:\frlrflr.exe60⤵
- Executes dropped EXE
PID:2196 -
\??\c:\nhnnht.exec:\nhnnht.exe61⤵
- Executes dropped EXE
PID:2024 -
\??\c:\nnnbbt.exec:\nnnbbt.exe62⤵
- Executes dropped EXE
PID:848 -
\??\c:\3jdpd.exec:\3jdpd.exe63⤵
- Executes dropped EXE
PID:2396 -
\??\c:\rffflxl.exec:\rffflxl.exe64⤵
- Executes dropped EXE
PID:1588 -
\??\c:\xfflfxr.exec:\xfflfxr.exe65⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nhbnbh.exec:\nhbnbh.exe66⤵PID:3048
-
\??\c:\9ttnbt.exec:\9ttnbt.exe67⤵PID:1032
-
\??\c:\5jjjp.exec:\5jjjp.exe68⤵PID:340
-
\??\c:\rxllflx.exec:\rxllflx.exe69⤵PID:1776
-
\??\c:\fxllrrf.exec:\fxllrrf.exe70⤵PID:1364
-
\??\c:\1bbbnt.exec:\1bbbnt.exe71⤵PID:1796
-
\??\c:\vpddj.exec:\vpddj.exe72⤵PID:900
-
\??\c:\pjdjp.exec:\pjdjp.exe73⤵PID:2080
-
\??\c:\fxflrlx.exec:\fxflrlx.exe74⤵PID:1924
-
\??\c:\lfxflrf.exec:\lfxflrf.exe75⤵PID:1036
-
\??\c:\nhbbbt.exec:\nhbbbt.exe76⤵PID:1336
-
\??\c:\7nbnbn.exec:\7nbnbn.exe77⤵PID:2944
-
\??\c:\9bttbh.exec:\9bttbh.exe78⤵PID:2220
-
\??\c:\jjpjj.exec:\jjpjj.exe79⤵PID:1592
-
\??\c:\9fxxlrx.exec:\9fxxlrx.exe80⤵PID:2016
-
\??\c:\rfrxfrx.exec:\rfrxfrx.exe81⤵PID:2060
-
\??\c:\hbhbbn.exec:\hbhbbn.exe82⤵PID:2236
-
\??\c:\tthbhn.exec:\tthbhn.exe83⤵PID:1584
-
\??\c:\tththh.exec:\tththh.exe84⤵PID:2844
-
\??\c:\7vvvj.exec:\7vvvj.exe85⤵PID:2604
-
\??\c:\fxrffrx.exec:\fxrffrx.exe86⤵PID:2560
-
\??\c:\xlfxffr.exec:\xlfxffr.exe87⤵PID:2636
-
\??\c:\1hbbhh.exec:\1hbbhh.exe88⤵PID:1284
-
\??\c:\vjjpv.exec:\vjjpv.exe89⤵PID:2460
-
\??\c:\jdddv.exec:\jdddv.exe90⤵PID:2416
-
\??\c:\rlrxxfx.exec:\rlrxxfx.exe91⤵PID:2216
-
\??\c:\rrlrflx.exec:\rrlrflx.exe92⤵PID:3040
-
\??\c:\hhbbhn.exec:\hhbbhn.exe93⤵PID:2624
-
\??\c:\jjjvv.exec:\jjjvv.exe94⤵PID:2464
-
\??\c:\7dvpv.exec:\7dvpv.exe95⤵PID:2540
-
\??\c:\vvpdp.exec:\vvpdp.exe96⤵PID:1704
-
\??\c:\lrxrxxx.exec:\lrxrxxx.exe97⤵PID:1652
-
\??\c:\xlflffr.exec:\xlflffr.exe98⤵PID:2644
-
\??\c:\nhbtbt.exec:\nhbtbt.exe99⤵PID:1640
-
\??\c:\nthhhb.exec:\nthhhb.exe100⤵PID:2652
-
\??\c:\vvddp.exec:\vvddp.exe101⤵PID:2424
-
\??\c:\5lffrrr.exec:\5lffrrr.exe102⤵PID:1936
-
\??\c:\lxlxllf.exec:\lxlxllf.exe103⤵PID:376
-
\??\c:\bnbhtb.exec:\bnbhtb.exe104⤵PID:1828
-
\??\c:\7hnhhh.exec:\7hnhhh.exe105⤵PID:1932
-
\??\c:\5pjvp.exec:\5pjvp.exe106⤵PID:1632
-
\??\c:\1pppp.exec:\1pppp.exe107⤵PID:2796
-
\??\c:\fxlrrxl.exec:\fxlrrxl.exe108⤵PID:2092
-
\??\c:\1xlrrrf.exec:\1xlrrrf.exe109⤵PID:380
-
\??\c:\ttnbbb.exec:\ttnbbb.exe110⤵PID:616
-
\??\c:\btbhnt.exec:\btbhnt.exe111⤵PID:2832
-
\??\c:\vjpjv.exec:\vjpjv.exe112⤵PID:2396
-
\??\c:\jjvdp.exec:\jjvdp.exe113⤵PID:2908
-
\??\c:\lxxxxfl.exec:\lxxxxfl.exe114⤵PID:2020
-
\??\c:\7lrxfxf.exec:\7lrxfxf.exe115⤵PID:3048
-
\??\c:\bttbth.exec:\bttbth.exe116⤵PID:1988
-
\??\c:\9ntbbh.exec:\9ntbbh.exe117⤵PID:1968
-
\??\c:\5jvpp.exec:\5jvpp.exe118⤵PID:3024
-
\??\c:\vjvvp.exec:\vjvvp.exe119⤵PID:912
-
\??\c:\xlrrrrx.exec:\xlrrrrx.exe120⤵PID:2744
-
\??\c:\lxlrxfr.exec:\lxlrxfr.exe121⤵PID:764
-
\??\c:\bnhtbn.exec:\bnhtbn.exe122⤵PID:2080
-
\??\c:\btthth.exec:\btthth.exe123⤵PID:540
-
\??\c:\jppjd.exec:\jppjd.exe124⤵PID:2168
-
\??\c:\vpvvd.exec:\vpvvd.exe125⤵PID:2032
-
\??\c:\lfxfrxl.exec:\lfxfrxl.exe126⤵PID:1516
-
\??\c:\lrrxrfx.exec:\lrrxrfx.exe127⤵PID:2220
-
\??\c:\nttnht.exec:\nttnht.exe128⤵PID:1592
-
\??\c:\ddjjv.exec:\ddjjv.exe129⤵PID:2852
-
\??\c:\pvvjp.exec:\pvvjp.exe130⤵PID:2792
-
\??\c:\rlxlffx.exec:\rlxlffx.exe131⤵PID:2236
-
\??\c:\xrllllr.exec:\xrllllr.exe132⤵PID:1612
-
\??\c:\tnbnnb.exec:\tnbnnb.exe133⤵PID:2520
-
\??\c:\1nbbhh.exec:\1nbbhh.exe134⤵PID:2608
-
\??\c:\dvvvd.exec:\dvvvd.exe135⤵PID:3012
-
\??\c:\jddjd.exec:\jddjd.exe136⤵PID:2532
-
\??\c:\ddjdj.exec:\ddjdj.exe137⤵PID:2468
-
\??\c:\flxlffr.exec:\flxlffr.exe138⤵PID:2728
-
\??\c:\xrflxfr.exec:\xrflxfr.exe139⤵PID:2704
-
\??\c:\tnhttb.exec:\tnhttb.exe140⤵PID:1980
-
\??\c:\3nbttt.exec:\3nbttt.exe141⤵PID:2344
-
\??\c:\vpjjd.exec:\vpjjd.exe142⤵PID:2624
-
\??\c:\vjvdp.exec:\vjvdp.exe143⤵PID:2428
-
\??\c:\ffxxrrf.exec:\ffxxrrf.exe144⤵PID:1644
-
\??\c:\3rlxrrl.exec:\3rlxrrl.exe145⤵PID:2300
-
\??\c:\nbnthh.exec:\nbnthh.exe146⤵PID:1568
-
\??\c:\htbbhh.exec:\htbbhh.exe147⤵PID:2720
-
\??\c:\pjdjv.exec:\pjdjv.exe148⤵PID:2548
-
\??\c:\3vjdj.exec:\3vjdj.exe149⤵PID:2648
-
\??\c:\1flxxrx.exec:\1flxxrx.exe150⤵PID:2696
-
\??\c:\lflrxff.exec:\lflrxff.exe151⤵PID:2136
-
\??\c:\tbbhnh.exec:\tbbhnh.exe152⤵PID:812
-
\??\c:\1ppvv.exec:\1ppvv.exe153⤵PID:1928
-
\??\c:\ppvpp.exec:\ppvpp.exe154⤵PID:2348
-
\??\c:\lfrfrrx.exec:\lfrfrrx.exe155⤵PID:1976
-
\??\c:\rxlxrrl.exec:\rxlxrrl.exe156⤵PID:1404
-
\??\c:\nbntbn.exec:\nbntbn.exe157⤵PID:1300
-
\??\c:\hbtbnt.exec:\hbtbnt.exe158⤵PID:3068
-
\??\c:\pdpvd.exec:\pdpvd.exe159⤵PID:2868
-
\??\c:\rlxrffl.exec:\rlxrffl.exe160⤵PID:2832
-
\??\c:\rrlxrll.exec:\rrlxrll.exe161⤵PID:2396
-
\??\c:\bttnbb.exec:\bttnbb.exe162⤵PID:2908
-
\??\c:\3thhnn.exec:\3thhnn.exe163⤵PID:1824
-
\??\c:\vjvdd.exec:\vjvdd.exe164⤵PID:988
-
\??\c:\dpdjd.exec:\dpdjd.exe165⤵PID:1032
-
\??\c:\lflrfxf.exec:\lflrfxf.exe166⤵PID:2248
-
\??\c:\fxfllxl.exec:\fxfllxl.exe167⤵PID:2388
-
\??\c:\7ntbhb.exec:\7ntbhb.exe168⤵PID:1796
-
\??\c:\nthtbt.exec:\nthtbt.exe169⤵PID:2212
-
\??\c:\3jvdj.exec:\3jvdj.exe170⤵PID:608
-
\??\c:\xrxfrrx.exec:\xrxfrrx.exe171⤵PID:308
-
\??\c:\nnnnnt.exec:\nnnnnt.exe172⤵PID:2056
-
\??\c:\5vpvd.exec:\5vpvd.exe173⤵PID:2876
-
\??\c:\rlxfxxl.exec:\rlxfxxl.exe174⤵PID:1600
-
\??\c:\ththtb.exec:\ththtb.exe175⤵PID:1344
-
\??\c:\dpvvv.exec:\dpvvv.exe176⤵PID:2116
-
\??\c:\jvppd.exec:\jvppd.exe177⤵PID:2244
-
\??\c:\5xlfllr.exec:\5xlfllr.exe178⤵PID:2888
-
\??\c:\jdvdj.exec:\jdvdj.exe179⤵PID:1716
-
\??\c:\1dppp.exec:\1dppp.exe180⤵PID:2948
-
\??\c:\xxlrxrx.exec:\xxlrxrx.exe181⤵PID:1092
-
\??\c:\lllxlxx.exec:\lllxlxx.exe182⤵PID:2692
-
\??\c:\fxxlxrl.exec:\fxxlxrl.exe183⤵PID:2576
-
\??\c:\bbbhbh.exec:\bbbhbh.exe184⤵PID:1800
-
\??\c:\thntht.exec:\thntht.exe185⤵PID:2532
-
\??\c:\jvvvd.exec:\jvvvd.exe186⤵PID:2672
-
\??\c:\vpvpv.exec:\vpvpv.exe187⤵PID:2488
-
\??\c:\rlrlrlx.exec:\rlrlrlx.exe188⤵PID:2596
-
\??\c:\fxrxxlr.exec:\fxrxxlr.exe189⤵PID:3036
-
\??\c:\1bntbn.exec:\1bntbn.exe190⤵PID:2600
-
\??\c:\nntnhn.exec:\nntnhn.exe191⤵PID:2320
-
\??\c:\vvjvj.exec:\vvjvj.exe192⤵PID:2660
-
\??\c:\jdppd.exec:\jdppd.exe193⤵PID:1336
-
\??\c:\7lffrrl.exec:\7lffrrl.exe194⤵PID:1804
-
\??\c:\lrlrfxf.exec:\lrlrfxf.exe195⤵PID:1960
-
\??\c:\nnnntt.exec:\nnnntt.exe196⤵PID:560
-
\??\c:\7hbthh.exec:\7hbthh.exe197⤵PID:2400
-
\??\c:\djpdj.exec:\djpdj.exe198⤵PID:1028
-
\??\c:\3vddj.exec:\3vddj.exe199⤵PID:1340
-
\??\c:\flrxfrl.exec:\flrxfrl.exe200⤵PID:1816
-
\??\c:\fxllxlx.exec:\fxllxlx.exe201⤵PID:1956
-
\??\c:\tbnthh.exec:\tbnthh.exe202⤵PID:1088
-
\??\c:\hnbbbn.exec:\hnbbbn.exe203⤵PID:2420
-
\??\c:\jjpvj.exec:\jjpvj.exe204⤵PID:2536
-
\??\c:\jjddp.exec:\jjddp.exe205⤵PID:1208
-
\??\c:\lfxfrxl.exec:\lfxfrxl.exe206⤵PID:1404
-
\??\c:\9btthn.exec:\9btthn.exe207⤵PID:1312
-
\??\c:\htnthh.exec:\htnthh.exe208⤵PID:3068
-
\??\c:\vdvvv.exec:\vdvvv.exe209⤵PID:2868
-
\??\c:\pjdjd.exec:\pjdjd.exe210⤵PID:576
-
\??\c:\rlxxfrx.exec:\rlxxfrx.exe211⤵PID:2104
-
\??\c:\xrxxrrf.exec:\xrxxrrf.exe212⤵PID:664
-
\??\c:\tttnbn.exec:\tttnbn.exe213⤵PID:1824
-
\??\c:\1hbbhn.exec:\1hbbhn.exe214⤵PID:988
-
\??\c:\9htbhn.exec:\9htbhn.exe215⤵PID:1032
-
\??\c:\vpjdp.exec:\vpjdp.exe216⤵PID:3024
-
\??\c:\dvddp.exec:\dvddp.exe217⤵PID:840
-
\??\c:\llflxxf.exec:\llflxxf.exe218⤵PID:2804
-
\??\c:\rlffrfl.exec:\rlffrfl.exe219⤵PID:952
-
\??\c:\9nhbhh.exec:\9nhbhh.exe220⤵PID:900
-
\??\c:\nhtbnt.exec:\nhtbnt.exe221⤵PID:540
-
\??\c:\jpdjd.exec:\jpdjd.exe222⤵PID:2168
-
\??\c:\pjvdj.exec:\pjvdj.exe223⤵PID:2944
-
\??\c:\xxrffrr.exec:\xxrffrr.exe224⤵PID:2124
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe225⤵PID:2140
-
\??\c:\5tbhtt.exec:\5tbhtt.exe226⤵PID:1516
-
\??\c:\3ntnnh.exec:\3ntnnh.exe227⤵PID:1296
-
\??\c:\9dpdd.exec:\9dpdd.exe228⤵PID:1620
-
\??\c:\vjdvj.exec:\vjdvj.exe229⤵PID:2792
-
\??\c:\xrlxffl.exec:\xrlxffl.exe230⤵PID:2556
-
\??\c:\xrxfffr.exec:\xrxfffr.exe231⤵PID:1612
-
\??\c:\1rflxxf.exec:\1rflxxf.exe232⤵PID:2560
-
\??\c:\1bhhnt.exec:\1bhhnt.exe233⤵PID:2608
-
\??\c:\btnhnt.exec:\btnhnt.exe234⤵PID:2440
-
\??\c:\jjpvj.exec:\jjpvj.exe235⤵PID:356
-
\??\c:\pvjpv.exec:\pvjpv.exe236⤵PID:2528
-
\??\c:\9xrlrrx.exec:\9xrlrrx.exe237⤵PID:2728
-
\??\c:\7fxfxff.exec:\7fxfxff.exe238⤵PID:2836
-
\??\c:\nnnbth.exec:\nnnbth.exe239⤵PID:2552
-
\??\c:\7httbt.exec:\7httbt.exe240⤵PID:2108
-
\??\c:\pdvvj.exec:\pdvvj.exe241⤵PID:2448
-
\??\c:\jdpvd.exec:\jdpvd.exe242⤵PID:2816